[Japanese]

JVNDB-2017-004607

Deep Discovery Email Inspector vulnerable to arbitrary code execution

Overview

Deep Discovery Email Inspector provided by Trend Micro Incorporated contains an arbitrary code execution vulnerability due to an issue in uploading files.

Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 9.8 (Critical) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
CVSS V2 Severity:
Base Metrics 10.0 (High) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Low
  • Authentication: None
  • Confidentiality Impact: Complete
  • Integrity Impact: Complete
  • Availability Impact: Complete
Affected Products


Trend Micro, Inc.
  • Deep Discovery Email Inspector Version 2.5.1 prior to Critical Patch b1182

Impact

An unauthenticated remote attacker may upload an arbitrary file to the system where the product resides. As a result, arbitrary code may be executed with the root privilege.
Solution

[Apply the Patch]
Apply the appropriate patch according to the information provided by the developer.
The developer has released the patch listed below to fix this vulnerability.

* Deep Discovery Email Inspector 2.5.1 Critical Patch b1182
Vendor Information

Trend Micro, Inc.
CWE (What is CWE?)

CVE (What is CVE?)

References

  1. JVN : JVNVU#95587881
  2. Related document : ZDI-17-283
  3. Related document : Zero Day Initiative
Revision History

  • [2018/01/31]
      Web page was published